Skip to main content
News

Cyber News Rundown: Chinese automotive supplier suffers Qilin ransomware attack

Cyber News Rundown: Chinese automotive supplier suffers Qilin ransomware attack
Forum|alt.badge.img+7
  • Threat Research Analyst
  • 4 replies

Recently, the threat actors behind the Qilin ransomware group added a significant amount of sensitive data belonging to the automotive parts supplier, Yanfeng, to their dark web leak site. It was reported that a disruption occurred at their North American manufacturing facilities on November 13th, but the company was not forthcoming with any additional information on the incident and has yet to release a statement regarding the disruptions. It is unclear how long Yanfeng officials will have to negotiate the release of their stolen data, but the Qilin leak site states that they will publish the data shortly.

ALPHV/BlackCat ransomware targets Fidelity National Financial

Early last week, officials for Fidelity National Financial (FNF) confirmed that they had fallen victim to a cybersecurity attack and were forced to take several of their internal systems offline. It is believed that the ALPHV/BlackCat ransomware group are responsible for the intrusion and the group has added FNF to their dark web leak site, though the threat actors have not confirmed if the attack resulted in the exfiltration of FNF data, as they are waiting for a negotiation response from the company.

Ardent Health Services falls victim to Thanksgiving ransomware attack

On Thanksgiving morning, staff at Ardent Health Services identified unauthorized activity on their internal network and were forced to take it offline while they began investigating. It was later revealed that the incident was a ransomware attack, though they have not confirmed if any information was stolen, or which ransomware group may have been responsible for the network breach. Fortunately, staff at many of the affected healthcare facilities are still able to process new patients and maintain basic emergency services.

Rhysida ransomware encrypts Slovenian power company

Recently, the state-owned Slovenian power company, Holding Slovenske Elektrarne (HSE), was the target of a ransomware attack by the Rhysida group, though they claim that power plant operations were unaffected. Unfortunately, the investigation has confirmed that several systems were encrypted and may have also been exfiltrated during the network breach. Though the Rhysida threat actors haven’t taken responsibility for this attack, this does continue the trend of ransomware groups targeting national infrastructure facilities.

AutoZone reveals breach as part of MOVEit data transfer vulnerability

Officials for the automotive retailer, AutoZone, have recently begun contacting customers regarding their data loss as part of the MOVEit file transfer vulnerability compromise that was carried out by the Cl0p ransomware group. After several months of investigation, AutoZone staff were able to finally confirm that nearly 185,000 customers had their data compromised during the breach and that they would provide identity monitoring services to all affected customers.

Did this help you find an answer to your question?

12 replies

ProTruckDriver
Moderator

Thanks Connor. Looks like a lot of Ransomware.☹️


Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

Thank you @ConnorM 

I see the health services are hit again, someday we will get a surprise and the health services will not be included in your report.


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Moderator
  • 9043 replies
  • December 1, 2023

Thanks Conner for the info, but it’s never good.. 😉


russell.harris
Popular Voice
Forum|alt.badge.img+5

Yes. Thanks @ConnorM but again it’s not good news


tasystems
New Voice
Forum|alt.badge.img+8
  • New Voice
  • 156 replies
  • December 2, 2023

Once again, the health industry gets attacked, and the public’s private information gets leaked online.
Its so sad that the people skilled in doing this, clearly do not have any morals, or integrity when it comes potentially destroying someones life if the wrong information was leaked. I wonder how these people sleep at night.


Robis
New Member
Forum|alt.badge.img+1
  • New Member
  • 74 replies
  • December 2, 2023

Thank You Connor.


Forum|alt.badge.img+7
  • Author
  • Threat Research Analyst
  • 4 replies
  • December 2, 2023
Jasper_The_Rasper wrote:

Thank you @ConnorM 

I see the health services are hit again, someday we will get a surprise and the health services will not be included in your report.

The real surprise would be that health services finally decide to properly invest in securing the data that they are mandated to store!


ProTruckDriver
Moderator
ConnorM wrote:
Jasper_The_Rasper wrote:

Thank you @ConnorM 

I see the health services are hit again, someday we will get a surprise and the health services will not be included in your report.

The real surprise would be that health services finally decide to properly invest in securing the data that they are mandated to store!

You’re right @ConnorM . I remember years back when Window XP was being used in the cancer center. They still used XP many, many months after the expiration of updates for XP. As I sat in their office I thought all my Medical Records are on their computer. 😳 They are now using updated software (I Think?).


Forum|alt.badge.img+1
  • New Member
  • 56 replies
  • December 2, 2023

Thanks Connor 😁


kleinmat4103
Popular Voice
Forum|alt.badge.img+6
  • Popular Voice
  • 512 replies
  • December 4, 2023

Good grief. So much ransomware! I wonder if there is any good tech news out there. lol

 

Thanks Connor!


Jamesharris85
New Voice
Forum|alt.badge.img+4

Thanks for the update Connor 


MajorHavoc
Bronze VIP
Forum|alt.badge.img+25
  • Bronze VIP
  • 1278 replies
  • December 5, 2023

Thanks for the scary update Connor.